Analysis
-
max time kernel
68s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:50
Static task
static1
General
-
Target
1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe
-
Size
354KB
-
MD5
37bf44f8489e4594c538a363e83d876a
-
SHA1
a72346b9a7dea9136ea020a3faae1aabe3e5fe9d
-
SHA256
1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8
-
SHA512
24b2c78dfe4f16aaa06773c7a4920c7243dc5e07ef87ba31cb04bdb03f0d14f457d0c2de14c92b4f593f82761c0f2433b1d98f0090fae799ff6f33eb8d2b114f
-
SSDEEP
6144:W/BdyBWD1LofPX2ijCeM2cp8OQyqM753pczq3XjcoZpLZbkWbzxjw:g6WD1EfPGijfCHqM75mcXYK1bkWi
Malware Config
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3224-136-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-137-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-139-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-141-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-144-0x00000000026F0000-0x0000000002700000-memory.dmp family_redline behavioral1/memory/3224-143-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-147-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-149-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-151-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-153-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-155-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-157-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-159-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-161-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-163-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-165-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-167-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-169-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-171-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-173-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-175-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-177-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-179-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-181-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-183-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-185-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-187-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-189-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-191-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-193-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-195-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-197-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-199-0x0000000002830000-0x0000000002882000-memory.dmp family_redline behavioral1/memory/3224-201-0x0000000002830000-0x0000000002882000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1328 3224 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3224 1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe 3224 1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3224 1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe"C:\Users\Admin\AppData\Local\Temp\1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 12802⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3224 -ip 32241⤵PID:1552